Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/04/2025, 08:25

General

  • Target

    Redline.Stealer.v30.2.Cracked.rar

  • Size

    47.3MB

  • MD5

    6ccff43d453859b019795cf3e8fbc4e0

  • SHA1

    17bc784760bed5ea52175eeb90c940bb552e99be

  • SHA256

    c6977344d1f554b219939e24dff20b211c948ee59d750e37b67dbc0557b10bd0

  • SHA512

    9d71b5d9e0e380216599b56669e25ff1f86132c1b8e019b1ceadc9693796075bde49b60514d272aeb7245d38b8c247ad62df7f63704d9e2b19a4f1b4c7ed6cfb

  • SSDEEP

    786432:HsCCAWDbN+bjAL5nwg9bssUo3TR2w6q/bIyQp0DNcYna070CZBTwNfgYAN2Sja8e:HsCChojA1nwITTMYbIyQGGYnr0GBcNf9

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Redline.Stealer.v30.2.Cracked.rar"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5816
  • C:\Program Files\7-Zip\7zG.exe
    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\" -spe -an -ai#7zMap32175:116:7zEvent28955
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4584
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4340
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Password.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:5968
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\" -an -ai#7zMap15409:248:7zEvent3226
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4112
    • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Panel.exe
      "C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Panel.exe"
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4208
      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Panel.exe
        "C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Panel.exe" "--monitor"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:4552
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:5340
      • C:\Windows\system32\ipconfig.exe
        ipconfig
        2⤵
        • Gathers network information
        PID:1644
    • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\builder\RedlineBuilder.exe
      "C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\builder\RedlineBuilder.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:112
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\builder\builder.bat" "
      1⤵
        PID:4652

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked.rar

        Filesize

        47.3MB

        MD5

        7bab0db9d2a49a5ad6791b6a45d5da9e

        SHA1

        d497aaf2b289550045d62e7403800b3207e5c9b7

        SHA256

        ab91a351bc3d529f796a789a370bd95c74390d1e2439dd8f7c4b56439e8fcb68

        SHA512

        937b158b90c5ae3d685d907afd8c147dd8fd1c8df69565404d38492ce3c1d825c804f1d6386e9285802c73d1696890c6c96895313502d68e7f2058560996f97e

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\GuiLib.dll

        Filesize

        50KB

        MD5

        42d66964ee6b3aa7710f07803f2e9565

        SHA1

        1af7fdf8b45f0003810c3b0c13e982c5c865d557

        SHA256

        05e0e8394154edf4366d6af144934a7014a0ad06f571dfd1e132d7099c8118e9

        SHA512

        311cd9febd10db76e101a059410ddc4af35916ac88dda0719dd5e4f2473bcc8485161da576f9512f73716258e19f53b61515875ad0c590d1c8854ccfb525d8eb

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\IPLocator.dll

        Filesize

        34KB

        MD5

        c8b0ac355a4eccd2390775fd4f2f72bc

        SHA1

        a56a296cf3a9b82a02db244a4112954b2f79f59e

        SHA256

        0d1dc8a4030f457fd6323b3646f1ad8e062e2afb17845a6ffa29795dc618bb4d

        SHA512

        73e5dc0f863ce8f17bdc9166cdae0b35f115c1f4cc247be0c07d8dd2e8dba19c24827ce1989136247732cd28380b89eb843d736f67f93304bce7adf546558621

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\MetroSet UI.dll

        Filesize

        436KB

        MD5

        5aeea45913eb8475077a9547d7d3f2f3

        SHA1

        09931075a4fdffe7b051df6d3bc5b4a0bacdf019

        SHA256

        ef2a67849fbe0f1c99263bf0acfddf15a1b3668e49fd9d35868e147d8a4c8c73

        SHA512

        3f3ba1d117784aca8d6abfe84e9275da425fd23982aa1ce9af760a9e5d7cd5e9dc2e36a36cc6e190cb91e8b2c8888881cfd8feeb85c3249185d61273a1a1e0ff

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Newtonsoft.Json.Schema.dll

        Filesize

        208KB

        MD5

        260a18bcc6d697d5c9f42299f2f34195

        SHA1

        de566fe1aa6d98310ddfa9d0773d1bdf47675c37

        SHA256

        b3cc57a64a89017c294927d93a24d10e5863287cdf32bd0f173386d3caebf5a8

        SHA512

        0451e2027ce21d1e7ed5267917b49c27f1e264ef58512d489da5d4359b62ceb7971ab2adec569a0626d9bcdeeae1f1f4744b5d0c8e1158a2af70c1e03d2cae29

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Newtonsoft.Json.dll

        Filesize

        683KB

        MD5

        6815034209687816d8cf401877ec8133

        SHA1

        1248142eb45eed3beb0d9a2d3b8bed5fe2569b10

        SHA256

        7f912b28a07c226e0be3acfb2f57f050538aba0100fa1f0bf2c39f1a1f1da814

        SHA512

        3398094ce429ab5dcdecf2ad04803230669bb4accaef7083992e9b87afac55841ba8def2a5168358bd17e60799e55d076b0e5ca44c86b9e6c91150d3dc37c721

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Panel.exe

        Filesize

        12.1MB

        MD5

        85afedf22ca7d0561be4443e854459a7

        SHA1

        1fec08de68672a302f0df40ff30b22cee4d18057

        SHA256

        130a2379f8f07cec2cd9935bdf67bfcfbb977327f89f017dc16f19efc871d864

        SHA512

        e5229c4e67bc7d4ef8b53c94cfd017833797ecb52a93d71e9770ae50aaaa8e3e6c9b6433389f85255c2fe92bf94bdf1f6d1c49a01ac0809d7c8ccdb8c07dce03

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Panel.exe.config

        Filesize

        26KB

        MD5

        14c52be5c2f2e05b34c971ab1c5a1f6e

        SHA1

        ca6af3aeef6b4f7d0b9d9199b985251d29aa65e2

        SHA256

        46de03cb4b125529c7aaf6024d3a287fb7c01bc5514664aae89d1a2f05af951a

        SHA512

        9266c85eb86115eef864e18bc46a5d2aae82e81ddbffc1589bad308ab1f7122d8a92bb5260e957a97350190bcaad27e93ad2bc1f7db1aaddc1c44a80dc728108

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Password.txt

        Filesize

        18B

        MD5

        b6ce586d5cb92ad00f46923ce5263a52

        SHA1

        bf114989fe5c181ad1bb5b590be1e0b85bb5e808

        SHA256

        2079244811531293a5117b8924a53bf731721c6644f988f5132fa038cf857cb4

        SHA512

        3a66eb140fba06fad68739a183ee949354bf84c3f6569d9b9b993c1e1e0db414127c9b14d2b4a13b5c264098d19008f6990cf95e663d195075a25dc1e09f9ca1

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Pluralsight.Crypto.dll

        Filesize

        45KB

        MD5

        4ae6096005c37982c8b0c7b465d88da5

        SHA1

        93486afd78d1dba82722bee3ff7661e4740b9f05

        SHA256

        e3e598d322d72e6b717f6753d02d8f98a5436e884adbc0cc383e7a39a3c35b04

        SHA512

        86b52ab17120ec7c2941b7598c2b90ed8bce6f4c11a5c3e6e026c60f976ed58b042a8495c16f2a6a4dee8463da788a90ff6008069a133f566862afcc8ab65642

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Redline.Stealer.v30.2.Cracked.exe

        Filesize

        47.5MB

        MD5

        e3e8f26932b46bc402f3f47e52508226

        SHA1

        e762b2a2f1a25aebe6d41c6cb77c6ba31ed87c7a

        SHA256

        ee2d016a2c09c57286271e83b37de5bb335ab9c9c56f278c5fdbb6e4076dbabb

        SHA512

        8b296d82ae7ac1baa101b1edb1e33d34a8124b2515ef282e810d4b3f7c002724ed5132c54fe6627d4be25fe78716e20ff75bfbc66a498c4f49b6e3311087f651

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\WindowsFirewallHelper.dll

        Filesize

        73KB

        MD5

        a37d8988990b3843182c51f1b9e5be4c

        SHA1

        d91b359403b3522cf718114174791b7b5c4de508

        SHA256

        2d8800d0ab20711af316fca20244cc06261a15021b2a78ac3ec6bd489f352594

        SHA512

        90776764006741cf54d1e29796de19f01845148bd1f9770ebc9205e02fd53987a0250f0c23409acd8bea573cfcbc48b6b7614e7726d484f1ab64682740f392a6

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\builder\RedlineBuilder.exe

        Filesize

        308KB

        MD5

        128cbb0f113189a8af347f14cb223357

        SHA1

        7472ff8bcf4b6ab90e30ec0352f0ecb44c655cf7

        SHA256

        a392dc6ad27dbc999aef5db8efaa63a65e570ca3bff7a79c5053ce7b7ba41a0e

        SHA512

        1bddf607e1e8ef32d39e16fcb9d9d87573f61ceee9a898c287ad236beaea818b223a28196395145a7b3eca5883e5da5b3a3dc0273fd66d64e103c24739868b35

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\builder\builder.bat

        Filesize

        581B

        MD5

        5bffd9e309e1d362608a5188a0f0cdba

        SHA1

        d87cca8b89fc5cc4e77453a8aa03a058c8b5e85b

        SHA256

        6fa6de2709d0e38c8b651747cd37f73262118c005ae89e37b80cce0eaad1ff88

        SHA512

        8e9b6e0d479b7ea7a1cebd41deb59a13beccf36552388c41ddaf341021a0d62c972846a665cb30948e84981828ec5622570a46bcdb48a8cb6ae0a9991acd5989

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\builder\dnlib.dll

        Filesize

        1.1MB

        MD5

        3d913aab7b1c514502c6a232e37d470e

        SHA1

        28ac2d1519ec5ea58b81fe40777645acc043b349

        SHA256

        bdb84aa16678189510def7c589851f6ea15e60ff977ea4c7c8c156504e6ac0ff

        SHA512

        311e8f73c52dd65cbaf9f6e008b3231090ea99edf3471bac63cca4156a37a0d874ac590b19c01b15e05345bb6a5b636a11698bbd4e88c59c138dd3f358800027

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\panelSettings.json

        Filesize

        5KB

        MD5

        346419d2a3f9f87e978adf74e99b61f7

        SHA1

        8dce4be68e65729c10c152fc9106117b49da8554

        SHA256

        f98125103ff50480a43581c4151f7b860595aaf4e91e781c4526916964ea3ced

        SHA512

        3dca4d30ac090f55d29157ebd1cb9885a2e2786eaa14c26f69a5f758ad82fa29d40e2ff7ba6c3999c251ba83225435ebbdccc8019bfceef54769e99dd25a4c1c

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\protobuf-net.dll

        Filesize

        274KB

        MD5

        d16fffeb71891071c1c5d9096ba03971

        SHA1

        24c2c7a0d6c9918f037393c2a17e28a49d340df1

        SHA256

        141b235af8ebf25d5841edee29e2dcf6297b8292a869b3966c282da960cbd14d

        SHA512

        27fb5b77fcadbe7bd1af51f7f40d333cd12de65de12e67aaea4e5f6c0ac2a62ee65bdafb1dbc4e3c0a0b9a667b056c4c7d984b4eb1bf4b60d088848b2818d87a

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\serviceSettings.json

        Filesize

        73B

        MD5

        f9d5b6cb3abf194a7d4174fb5114fc24

        SHA1

        b62700cf1b734926f14d9b05382270c4f868b181

        SHA256

        ae0f138e5860dc597e29566588fc9e64df46fc4407591bb549fbd642eab0f6c7

        SHA512

        96464a563b524ecb32154b4180772e3b6af5935684818b5f0b9f38f63c458f71498bce775c78db3bc7c279ee7dcf86d013f51f61cd8df4b23e426bd907f08c7d

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\stats.json

        Filesize

        174B

        MD5

        0f91aea181cd167baad6ef0f2f07176d

        SHA1

        924f29e47a17e4933a4d8db2627344657acbca20

        SHA256

        60f69cf6704a36cfdb8ca2b1304db90b8dc60ff1364ff225c9c97c928b4577cf

        SHA512

        025ecaaeb9972978792c86a5c5f0d4aa53dfcaf30ea867808cd398ed7ab1acf53e179393aeab0424bd23115fc267723d4fcb70107347fbb8ad3f1ff8e9c3d3dd

      • C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\telegramChatsSettings.json

        Filesize

        2B

        MD5

        d751713988987e9331980363e24189ce

        SHA1

        97d170e1550eee4afc0af065b78cda302a97674c

        SHA256

        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

        SHA512

        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

      • memory/112-126-0x00000000052F0000-0x0000000005416000-memory.dmp

        Filesize

        1.1MB

      • memory/112-122-0x0000000000820000-0x0000000000874000-memory.dmp

        Filesize

        336KB

      • memory/4208-84-0x000001BC87FB0000-0x000001BC88BC4000-memory.dmp

        Filesize

        12.1MB

      • memory/4552-89-0x0000020DADF20000-0x0000020DADF32000-memory.dmp

        Filesize

        72KB

      • memory/4552-101-0x0000020DC7100000-0x0000020DC7118000-memory.dmp

        Filesize

        96KB

      • memory/4552-105-0x0000020DC7A80000-0x0000020DC7A90000-memory.dmp

        Filesize

        64KB

      • memory/4552-99-0x0000020DCA180000-0x0000020DCA1CA000-memory.dmp

        Filesize

        296KB

      • memory/4552-97-0x0000020DC80E0000-0x0000020DC8198000-memory.dmp

        Filesize

        736KB

      • memory/4552-113-0x0000020DC7A60000-0x0000020DC7A72000-memory.dmp

        Filesize

        72KB

      • memory/4552-114-0x0000020DC7AF0000-0x0000020DC7B2C000-memory.dmp

        Filesize

        240KB

      • memory/4552-96-0x0000020DAE060000-0x0000020DAE082000-memory.dmp

        Filesize

        136KB

      • memory/4552-95-0x0000020DAE020000-0x0000020DAE05A000-memory.dmp

        Filesize

        232KB

      • memory/4552-93-0x0000020DC6F90000-0x0000020DC7040000-memory.dmp

        Filesize

        704KB

      • memory/4552-91-0x0000020DADF10000-0x0000020DADF20000-memory.dmp

        Filesize

        64KB

      • memory/4552-87-0x0000020DADFA0000-0x0000020DAE014000-memory.dmp

        Filesize

        464KB